Auto Update 2025/01/12 12:31:56

This commit is contained in:
motikan2010-bot 2025-01-12 21:31:56 +09:00
parent 67d8520694
commit 1ee5d2aae2
45 changed files with 236 additions and 164 deletions

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-09T02:25:56Z",
"pushed_at": "2025-01-12T11:49:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -1183,10 +1183,10 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2024-12-31T15:47:51Z",
"updated_at": "2025-01-12T10:37:41Z",
"pushed_at": "2023-02-02T02:17:30Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 278,
"watchers_count": 278,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -1195,7 +1195,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 277,
"watchers": 278,
"score": 0,
"subscribers_count": 4
},

View file

@ -615,10 +615,10 @@
"description": "is a PoC tool demonstrating an exploit for a known vulnerability in the WebDAV component of IIS6",
"fork": false,
"created_at": "2024-10-06T17:33:11Z",
"updated_at": "2024-10-21T08:15:02Z",
"updated_at": "2025-01-12T11:49:52Z",
"pushed_at": "2024-10-07T17:34:02Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -627,7 +627,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

33
2019/CVE-2019-5602.json Normal file
View file

@ -0,0 +1,33 @@
[
{
"id": 915577425,
"name": "CVE-2019-5602-poc",
"full_name": "test-one9\/CVE-2019-5602-poc",
"owner": {
"login": "test-one9",
"id": 175934231,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175934231?v=4",
"html_url": "https:\/\/github.com\/test-one9",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/test-one9\/CVE-2019-5602-poc",
"description": "https:\/\/www.freebsd.org\/security\/advisories\/FreeBSD-SA-19:11.cd_ioctl.asc",
"fork": false,
"created_at": "2025-01-12T08:24:58Z",
"updated_at": "2025-01-12T08:26:34Z",
"pushed_at": "2025-01-12T08:26:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -1039,10 +1039,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2025-01-10T17:59:26Z",
"updated_at": "2025-01-12T10:14:06Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1303,
"watchers_count": 1303,
"stargazers_count": 1304,
"watchers_count": 1304,
"has_discussions": false,
"forks_count": 343,
"allow_forking": true,
@ -1057,7 +1057,7 @@
],
"visibility": "public",
"forks": 343,
"watchers": 1303,
"watchers": 1304,
"score": 0,
"subscribers_count": 34
},

View file

@ -14,10 +14,10 @@
"description": "poc for CVE-2020-13519(still under construction). needs refining , testing , tunning...",
"fork": false,
"created_at": "2024-09-30T06:28:49Z",
"updated_at": "2024-10-02T08:18:10Z",
"updated_at": "2025-01-12T11:13:21Z",
"pushed_at": "2024-09-30T06:30:50Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -300,5 +300,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 915270847,
"name": "CVE-2021-21551",
"full_name": "IlanDudnik\/CVE-2021-21551",
"owner": {
"login": "IlanDudnik",
"id": 16364955,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16364955?v=4",
"html_url": "https:\/\/github.com\/IlanDudnik",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/IlanDudnik\/CVE-2021-21551",
"description": "Exploit implementation for CVE-2021-21551",
"fork": false,
"created_at": "2025-01-11T12:18:40Z",
"updated_at": "2025-01-12T11:49:34Z",
"pushed_at": "2025-01-12T11:47:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -19,13 +19,13 @@
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": false,
"forks_count": 26,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 26,
"forks": 28,
"watchers": 115,
"score": 0,
"subscribers_count": 3

View file

@ -14,10 +14,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2024-12-06T23:49:42Z",
"updated_at": "2025-01-12T06:20:40Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 822,
"watchers_count": 822,
"stargazers_count": 823,
"watchers_count": 823,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 822,
"watchers": 823,
"score": 0,
"subscribers_count": 23
},

View file

@ -541,10 +541,10 @@
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
"updated_at": "2025-01-08T00:43:39Z",
"updated_at": "2025-01-12T11:03:30Z",
"pushed_at": "2023-10-11T18:44:51Z",
"stargazers_count": 805,
"watchers_count": 805,
"stargazers_count": 806,
"watchers_count": 806,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -560,7 +560,7 @@
],
"visibility": "public",
"forks": 170,
"watchers": 805,
"watchers": 806,
"score": 0,
"subscribers_count": 18
},

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-11T17:36:36Z",
"updated_at": "2025-01-12T07:43:36Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 822,
"watchers_count": 822,
"stargazers_count": 823,
"watchers_count": 823,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 822,
"watchers": 823,
"score": 0,
"subscribers_count": 13
},

View file

@ -381,10 +381,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2025-01-11T13:37:38Z",
"updated_at": "2025-01-12T10:32:11Z",
"pushed_at": "2024-04-26T03:16:26Z",
"stargazers_count": 1111,
"watchers_count": 1111,
"stargazers_count": 1112,
"watchers_count": 1112,
"has_discussions": false,
"forks_count": 535,
"allow_forking": true,
@ -395,7 +395,7 @@
],
"visibility": "public",
"forks": 535,
"watchers": 1111,
"watchers": 1112,
"score": 0,
"subscribers_count": 23
},
@ -935,10 +935,10 @@
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
"fork": false,
"created_at": "2021-12-10T23:19:28Z",
"updated_at": "2025-01-10T05:22:28Z",
"updated_at": "2025-01-12T10:31:59Z",
"pushed_at": "2024-02-12T22:37:25Z",
"stargazers_count": 1813,
"watchers_count": 1813,
"stargazers_count": 1814,
"watchers_count": 1814,
"has_discussions": false,
"forks_count": 530,
"allow_forking": true,
@ -952,7 +952,7 @@
],
"visibility": "public",
"forks": 530,
"watchers": 1813,
"watchers": 1814,
"score": 0,
"subscribers_count": 26
},
@ -3749,10 +3749,10 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2025-01-09T09:57:56Z",
"updated_at": "2025-01-12T10:31:42Z",
"pushed_at": "2022-11-23T18:23:24Z",
"stargazers_count": 3406,
"watchers_count": 3406,
"stargazers_count": 3407,
"watchers_count": 3407,
"has_discussions": true,
"forks_count": 739,
"allow_forking": true,
@ -3761,7 +3761,7 @@
"topics": [],
"visibility": "public",
"forks": 739,
"watchers": 3406,
"watchers": 3407,
"score": 0,
"subscribers_count": 55
},

View file

@ -29,36 +29,5 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 448062357,
"name": "CVE-2021-46068",
"full_name": "plsanu\/CVE-2021-46068",
"owner": {
"login": "plsanu",
"id": 61007700,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007700?v=4",
"html_url": "https:\/\/github.com\/plsanu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/plsanu\/CVE-2021-46068",
"description": "CVE-2021-46068 - A Stored Cross Site Scripting (XSS) vulnerability exists in Vehicle Service Management System 1.0 via the My Account Section in login panel.",
"fork": false,
"created_at": "2022-01-14T18:04:01Z",
"updated_at": "2023-12-30T08:24:13Z",
"pushed_at": "2022-01-14T19:34:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2024-12-31T15:47:51Z",
"updated_at": "2025-01-12T10:37:41Z",
"pushed_at": "2023-02-02T02:17:30Z",
"stargazers_count": 277,
"watchers_count": 277,
"stargazers_count": 278,
"watchers_count": 278,
"has_discussions": false,
"forks_count": 77,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 277,
"watchers": 278,
"score": 0,
"subscribers_count": 4
},
@ -107,10 +107,10 @@
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2025-01-06T05:11:29Z",
"updated_at": "2025-01-12T10:36:38Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 1092,
"watchers_count": 1092,
"stargazers_count": 1093,
"watchers_count": 1093,
"has_discussions": false,
"forks_count": 220,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 220,
"watchers": 1092,
"watchers": 1093,
"score": 0,
"subscribers_count": 18
},
@ -1941,8 +1941,8 @@
"description": null,
"fork": false,
"created_at": "2022-06-30T13:07:55Z",
"updated_at": "2024-07-01T18:57:06Z",
"pushed_at": "2024-07-01T18:57:03Z",
"updated_at": "2025-01-12T11:29:30Z",
"pushed_at": "2025-01-12T11:29:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2025-01-04T09:08:42Z",
"updated_at": "2025-01-12T11:40:21Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1173,
"watchers_count": 1173,
"stargazers_count": 1176,
"watchers_count": 1176,
"has_discussions": true,
"forks_count": 188,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 188,
"watchers": 1173,
"watchers": 1176,
"score": 0,
"subscribers_count": 19
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1

View file

@ -14,7 +14,7 @@
"description": null,
"fork": false,
"created_at": "2025-01-01T08:17:26Z",
"updated_at": "2025-01-11T05:45:53Z",
"updated_at": "2025-01-12T08:34:52Z",
"pushed_at": "2025-01-01T08:17:29Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -14,10 +14,10 @@
"description": "This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) of more than 60 Lexmark printer models. This issue affects both username-password and PIN authentication.",
"fork": false,
"created_at": "2023-01-24T08:33:19Z",
"updated_at": "2024-11-25T12:03:38Z",
"updated_at": "2025-01-12T08:08:37Z",
"pushed_at": "2024-07-19T06:36:55Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 86,
"watchers_count": 86,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 85,
"watchers": 86,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,7 +14,7 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2025-01-10T09:06:50Z",
"updated_at": "2025-01-12T11:49:13Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 632,
"watchers_count": 632,

View file

@ -19,13 +19,13 @@
"stargazers_count": 1380,
"watchers_count": 1380,
"has_discussions": false,
"forks_count": 237,
"forks_count": 238,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 237,
"forks": 238,
"watchers": 1380,
"score": 0,
"subscribers_count": 21

View file

@ -50,13 +50,13 @@
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 63,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 63,
"forks": 64,
"watchers": 276,
"score": 0,
"subscribers_count": 7

View file

@ -138,10 +138,10 @@
"description": "Proof of concept : CVE-2024-1071: WordPress Vulnerability Exploited",
"fork": false,
"created_at": "2024-08-30T04:23:04Z",
"updated_at": "2024-12-17T20:19:30Z",
"updated_at": "2025-01-12T06:37:01Z",
"pushed_at": "2024-08-30T05:10:51Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -150,7 +150,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 12,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": " Really Simple Security (Free, Pro, and Pro Multisite) 9.0.0 9.1.1.1 Authentication Bypass",
"fork": false,
"created_at": "2024-11-14T16:59:52Z",
"updated_at": "2024-12-12T13:40:41Z",
"updated_at": "2025-01-12T12:27:27Z",
"pushed_at": "2024-11-14T17:00:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -169,10 +169,10 @@
"description": "Windows AppLocker Driver (appid.sys) LPE",
"fork": false,
"created_at": "2024-07-29T13:18:06Z",
"updated_at": "2025-01-07T15:13:48Z",
"updated_at": "2025-01-12T09:27:29Z",
"pushed_at": "2024-07-29T13:29:59Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 47,
"watchers_count": 47,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -186,7 +186,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 46,
"watchers": 47,
"score": 0,
"subscribers_count": 1
},

View file

@ -234,10 +234,10 @@
"description": "Proof-of-Concept for LFI\/Path Traversal vulnerability in Aiohttp =< 3.9.1",
"fork": false,
"created_at": "2024-10-20T15:28:58Z",
"updated_at": "2024-12-29T20:57:19Z",
"updated_at": "2025-01-12T10:53:19Z",
"pushed_at": "2024-10-20T16:48:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -246,7 +246,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -107,10 +107,10 @@
"description": "Kernel exploit for Xbox SystemOS using CVE-2024-30088",
"fork": false,
"created_at": "2024-07-15T08:07:05Z",
"updated_at": "2025-01-09T11:58:18Z",
"updated_at": "2025-01-12T12:25:35Z",
"pushed_at": "2024-09-08T21:23:34Z",
"stargazers_count": 434,
"watchers_count": 434,
"stargazers_count": 435,
"watchers_count": 435,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 434,
"watchers": 435,
"score": 0,
"subscribers_count": 21
},

View file

@ -1435,8 +1435,8 @@
"description": "git clone rce CVE-2024-32002",
"fork": false,
"created_at": "2024-07-03T08:01:39Z",
"updated_at": "2024-10-31T20:50:27Z",
"pushed_at": "2024-07-09T01:52:48Z",
"updated_at": "2025-01-12T11:27:41Z",
"pushed_at": "2025-01-12T11:27:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,

View file

@ -565,8 +565,8 @@
"description": "PoC for CVE-2024-34102",
"fork": false,
"created_at": "2024-08-13T07:33:20Z",
"updated_at": "2024-10-04T10:38:23Z",
"pushed_at": "2024-08-13T08:48:46Z",
"updated_at": "2025-01-12T11:26:57Z",
"pushed_at": "2025-01-12T11:26:54Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "PoC for the Untrusted Pointer Dereference in the ks.sys driver",
"fork": false,
"created_at": "2024-10-13T19:30:20Z",
"updated_at": "2025-01-12T01:25:05Z",
"updated_at": "2025-01-12T11:55:04Z",
"pushed_at": "2024-11-29T16:56:23Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 263,
"watchers_count": 263,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 262,
"watchers": 263,
"score": 0,
"subscribers_count": 8
},

View file

@ -76,10 +76,10 @@
"description": "Spring Cloud Data Flow CVE-2024-37084 exp",
"fork": false,
"created_at": "2024-10-15T06:55:05Z",
"updated_at": "2024-10-16T02:27:56Z",
"updated_at": "2025-01-12T11:16:15Z",
"pushed_at": "2024-10-16T02:27:53Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -19,15 +19,15 @@
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
"subscribers_count": 2
}
]

View file

@ -121,6 +121,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -14,10 +14,10 @@
"description": "Proof of concept (POC) for CVE-2024-45337 ",
"fork": false,
"created_at": "2024-12-17T22:07:53Z",
"updated_at": "2024-12-19T08:35:28Z",
"updated_at": "2025-01-12T12:23:48Z",
"pushed_at": "2024-12-17T22:27:03Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,8 +14,8 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2024-10-23T10:50:01Z",
"updated_at": "2025-01-12T02:15:53Z",
"pushed_at": "2025-01-10T02:12:42Z",
"updated_at": "2025-01-12T11:25:17Z",
"pushed_at": "2025-01-12T11:25:15Z",
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,

View file

@ -169,10 +169,10 @@
"description": "Ultrafast CUPS-browsed scanner (CVE-2024-47176)",
"fork": false,
"created_at": "2024-09-29T09:05:30Z",
"updated_at": "2024-11-20T16:31:06Z",
"updated_at": "2025-01-12T10:59:27Z",
"pushed_at": "2024-10-07T19:24:35Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -187,7 +187,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -262,10 +262,10 @@
"description": "Proof-of-Concept for CVE-2024-46538",
"fork": false,
"created_at": "2025-01-03T02:30:53Z",
"updated_at": "2025-01-10T02:20:21Z",
"updated_at": "2025-01-12T07:56:06Z",
"pushed_at": "2025-01-03T18:51:20Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -282,7 +282,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -28,6 +28,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -45,8 +45,8 @@
"description": "Proof-of-Concept for CVE-2024-5932",
"fork": false,
"created_at": "2024-08-25T11:51:36Z",
"updated_at": "2025-01-05T01:14:48Z",
"pushed_at": "2024-08-29T02:13:12Z",
"updated_at": "2025-01-12T11:24:29Z",
"pushed_at": "2025-01-12T11:24:26Z",
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,

View file

@ -14,8 +14,8 @@
"description": "Proof-of-Concept for CVE-2024-9014",
"fork": false,
"created_at": "2024-09-26T10:34:34Z",
"updated_at": "2024-10-15T07:52:36Z",
"pushed_at": "2024-09-26T10:45:34Z",
"updated_at": "2025-01-12T11:26:00Z",
"pushed_at": "2025-01-12T11:25:57Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,

View file

@ -59,6 +59,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -107,10 +107,10 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-12T03:33:28Z",
"updated_at": "2025-01-12T12:03:23Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -119,7 +119,38 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"watchers": 18,
"score": 0,
"subscribers_count": 0
},
{
"id": 915634472,
"name": "CVE-2025-0282-Full-version",
"full_name": "anonzoli\/CVE-2025-0282-Full-version",
"owner": {
"login": "anonzoli",
"id": 185355974,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/185355974?v=4",
"html_url": "https:\/\/github.com\/anonzoli",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/anonzoli\/CVE-2025-0282-Full-version",
"description": "# CVE-2025-0282: Remote Code Execution Vulnerability in [StorkS]",
"fork": false,
"created_at": "2025-01-12T11:58:40Z",
"updated_at": "2025-01-12T12:16:53Z",
"pushed_at": "2025-01-12T12:15:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}

View file

@ -10,6 +10,7 @@
- [BishopFox/CVE-2025-0282-check](https://github.com/BishopFox/CVE-2025-0282-check)
- [NyxanGoat/CVE-2025-0282-PoC](https://github.com/NyxanGoat/CVE-2025-0282-PoC)
- [absholi7ly/CVE-2025-0282-Ivanti-exploit](https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit)
- [anonzoli/CVE-2025-0282-Full-version](https://github.com/anonzoli/CVE-2025-0282-Full-version)
### CVE-2025-22352 (2025-01-07)
@ -25220,6 +25221,7 @@
- [tijme/kernel-mii](https://github.com/tijme/kernel-mii)
- [nanabingies/CVE-2021-21551](https://github.com/nanabingies/CVE-2021-21551)
- [Eap2468/CVE-2021-21551](https://github.com/Eap2468/CVE-2021-21551)
- [IlanDudnik/CVE-2021-21551](https://github.com/IlanDudnik/CVE-2021-21551)
### CVE-2021-21716
- [MojithaR/CVE-2023-21716-EXPLOIT.py](https://github.com/MojithaR/CVE-2023-21716-EXPLOIT.py)
@ -30118,7 +30120,6 @@
</code>
- [plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS](https://github.com/plsanu/Vehicle-Service-Management-System-MyAccount-Stored-Cross-Site-Scripting-XSS)
- [plsanu/CVE-2021-46068](https://github.com/plsanu/CVE-2021-46068)
### CVE-2021-46069 (2022-01-06)
@ -36624,6 +36625,13 @@
- [raymontag/CVE-2019-5596](https://github.com/raymontag/CVE-2019-5596)
### CVE-2019-5602 (2019-07-03)
<code>In FreeBSD 12.0-STABLE before r349628, 12.0-RELEASE before 12.0-RELEASE-p7, 11.3-PRERELEASE before r349629, 11.3-RC3 before 11.3-RC3-p1, and 11.2-RELEASE before 11.2-RELEASE-p11, a bug in the cdrom driver allows users with read access to the cdrom device to arbitrarily overwrite kernel memory when media is present thereby allowing a malicious user in the operator group to gain root privileges.
</code>
- [test-one9/CVE-2019-5602-poc](https://github.com/test-one9/CVE-2019-5602-poc)
### CVE-2019-5603 (2019-07-26)
<code>In FreeBSD 12.0-STABLE before r350261, 12.0-RELEASE before 12.0-RELEASE-p8, 11.3-STABLE before r350263, 11.3-RELEASE before 11.3-RELEASE-p1, and 11.2-RELEASE before 11.2-RELEASE-p12, system calls operating on file descriptors as part of mqueuefs did not properly release the reference allowing a malicious user to overflow the counter allowing access to files, directories, and sockets opened by processes owned by other users.